Sciweavers

849 search results - page 3 / 170
» Completely Non-malleable Schemes
Sort
View
COMCOM
1999
78views more  COMCOM 1999»
13 years 5 months ago
A complete test sequence using cyclic sequence for conformance testing
We present a problem of commonly used characterization sequences (CS) for the protocol conformance testing and propose a new test sequence to resolve the problem. The proposed tes...
DaeHun Nyang, S. Y. Lim, JooSeok Song
CVPR
2011
IEEE
13 years 26 days ago
A Complete Statistical Inverse Ray Tracing Approach to Multi-view Stereo
This paper presents a complete solution to estimating a scene’s 3D geometry and appearance from multiple 2D images by using a statistical inverse ray tracing method. Instead of ...
Shubao Liu, David Cooper
ICALP
2005
Springer
13 years 11 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
JACM
2002
107views more  JACM 2002»
13 years 5 months ago
Paradoxes in distributed decisions on optimal load balancing for networks of homogeneous computers
In completely symmetric systems that have homogeneous nodes (hosts, computers, or processors) with identical arrival processes, an optimal static load balancing scheme does not in...
Hisao Kameda, Odile Pourtallier
CPC
2008
86views more  CPC 2008»
13 years 4 months ago
Enumeration Schemes for Restricted Permutations
Abstract. Zeilberger's enumeration schemes can be used to completely automate the enumeration of many permutation classes. We extend his enumeration schemes so that they apply...
Vincent Vatter